General

  • Target

    84bea19b7ec5a9d3f9bff3e8261ed64bcf8631ffff524284c619abbaa7bf23f2.elf

  • Size

    112KB

  • Sample

    250224-dpnyrszqx3

  • MD5

    cde2f014a8d775526ed93a6c64e5497c

  • SHA1

    5bd35d1703a08bddb59779aebb0f3a988df85ac0

  • SHA256

    84bea19b7ec5a9d3f9bff3e8261ed64bcf8631ffff524284c619abbaa7bf23f2

  • SHA512

    214dce97e6fee233e92a4cf5225cae596efff9e546597d149dc81e0a9ab1e723b032c89e7b2e84e35f52cb448d91d66923f31f7d7fce8186358b1a4039eb1ba1

  • SSDEEP

    3072:ULveOu+5FClWUaVeDYeQ115hiBrn1Gm0Qxu1bXWIn:6v78EVeDYH115hiBrn1Gm0Qxu1rWIn

Score
10/10

Malware Config

Extracted

Family

gafgyt

C2

173.208.190.227:4258

Targets

    • Target

      84bea19b7ec5a9d3f9bff3e8261ed64bcf8631ffff524284c619abbaa7bf23f2.elf

    • Size

      112KB

    • MD5

      cde2f014a8d775526ed93a6c64e5497c

    • SHA1

      5bd35d1703a08bddb59779aebb0f3a988df85ac0

    • SHA256

      84bea19b7ec5a9d3f9bff3e8261ed64bcf8631ffff524284c619abbaa7bf23f2

    • SHA512

      214dce97e6fee233e92a4cf5225cae596efff9e546597d149dc81e0a9ab1e723b032c89e7b2e84e35f52cb448d91d66923f31f7d7fce8186358b1a4039eb1ba1

    • SSDEEP

      3072:ULveOu+5FClWUaVeDYeQ115hiBrn1Gm0Qxu1bXWIn:6v78EVeDYH115hiBrn1Gm0Qxu1rWIn

    Score
    6/10
    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks